diff options
| author | Joseph Henry <[email protected]> | 2017-11-06 13:50:20 -0800 |
|---|---|---|
| committer | Joseph Henry <[email protected]> | 2017-11-06 13:50:20 -0800 |
| commit | e0d4b84dd49a1a6eb0492c813855a96f426ffead (patch) | |
| tree | 5c949afc7e634455d456a63e6ff38b6a193eab57 /src/picoTCP.cpp | |
| parent | 920afa079e90bbddc731a4311183b0e9f4c374f7 (diff) | |
Preparation for C--, removed classes, namespaces, advanced build options are now controlled via include/libztDefs.h
Diffstat (limited to 'src/picoTCP.cpp')
| -rw-r--r-- | src/picoTCP.cpp | 1979 |
1 files changed, 1979 insertions, 0 deletions
diff --git a/src/picoTCP.cpp b/src/picoTCP.cpp new file mode 100644 index 0000000..fc715c2 --- /dev/null +++ b/src/picoTCP.cpp @@ -0,0 +1,1979 @@ +/* + * ZeroTier SDK - Network Virtualization Everywhere + * Copyright (C) 2011-2017 ZeroTier, Inc. https://www.zerotier.com/ + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * You can be released from the requirements of the license by purchasing + * a commercial license. Buying such a license is mandatory as soon as you + * develop commercial closed-source software that incorporates or links + * directly against ZeroTier software without disclosing the source code + * of your own application. + */ + +/** + * @file + * + * picoTCP stack driver + */ + +#include "libztDefs.h" + +#ifdef STACK_PICO + +#include <ctime> +#include <stdint.h> + +#include "pico_eth.h" +#include "pico_stack.h" +#include "pico_ipv4.h" +#include "pico_icmp4.h" +#include "pico_dev_tap.h" +#include "pico_protocol.h" +#include "pico_socket.h" +#include "pico_device.h" +#include "pico_ipv6.h" +#include "pico_tcp.h" +#include "pico_dns_client.h" + +int errno; + +#include "libzt.h" +#include "SysUtils.h" +#include "Utilities.h" +#include "VirtualTap.h" +#include "picoTCP.h" +#include "RingBuffer.h" +#include "VirtualSocket.h" +#include "VirtualBindingPair.h" +#include "VirtualSocketLayer.h" +#include "ZT1Service.h" + +#include "Utils.hpp" +#include "Mutex.hpp" +#include "Constants.hpp" +#include "Phy.hpp" +#include "InetAddress.hpp" + +using namespace ZeroTier; + +int pico_ipv4_to_string(PICO_IPV4_TO_STRING_SIG); +extern "C" int pico_stack_init(void); +extern "C" void pico_stack_tick(void); +extern "C" int pico_ipv4_link_add(PICO_IPV4_LINK_ADD_SIG); +extern "C" int pico_ipv4_route_add(PICO_IPV4_ROUTE_ADD_SIG); +extern "C" int pico_ipv4_route_del(PICO_IPV4_ROUTE_DEL_SIG); +extern "C" int pico_device_init(PICO_DEVICE_INIT_SIG); +extern "C" int pico_string_to_ipv4(PICO_STRING_TO_IPV4_SIG); +extern "C" int pico_string_to_ipv6(PICO_STRING_TO_IPV6_SIG); +extern "C" int pico_socket_recvfrom(PICO_SOCKET_RECVFROM_SIG); +extern "C" struct pico_socket * pico_socket_open(PICO_SOCKET_OPEN_SIG); +extern "C" int pico_socket_connect(PICO_SOCKET_CONNECT_SIG); +extern "C" int pico_socket_listen(PICO_SOCKET_LISTEN_SIG); +extern "C" int pico_socket_write(PICO_SOCKET_WRITE_SIG); +extern "C" int pico_socket_close(PICO_SOCKET_CLOSE_SIG); +extern "C" struct pico_ipv6_link * pico_ipv6_link_add(PICO_IPV6_LINK_ADD_SIG); +extern "C" int pico_dns_client_nameserver(PICO_DNS_CLIENT_NAMESERVER_SIG); + +/* +int pico_stack_recv(PICO_STACK_RECV_SIG); +int pico_icmp4_ping(PICO_ICMP4_PING_SIG); +int pico_socket_setoption(PICO_SOCKET_SETOPTION_SIG); +uint32_t pico_timer_add(PICO_TIMER_ADD_SIG); +int pico_socket_send(PICO_SOCKET_SEND_SIG); +int pico_socket_sendto(PICO_SOCKET_SENDTO_SIG); +int pico_socket_recv(PICO_SOCKET_RECV_SIG); +int pico_socket_bind(PICO_SOCKET_BIND_SIG); +int pico_socket_read(PICO_SOCKET_READ_SIG); +int pico_socket_shutdown(PICO_SOCKET_SHUTDOWN_SIG); +struct pico_socket * pico_socket_accept(PICO_SOCKET_ACCEPT_SIG); +*/ + +extern std::vector<void*> vtaps; + +/* + * Whether our picoTCP device has been initialized + */ +static bool picodev_initialized; + +struct pico_device picodev; +ZeroTier::Mutex _picostack_driver_lock; + +bool pico_init_interface(VirtualTap *tap) +{ + bool err = false; + _picostack_driver_lock.lock(); + // give right to vtap to start the stack + // only one stack loop is permitted + if (picodev_initialized == false) { + tap->should_start_stack = true; + picodev.send = rd_pico_eth_tx; // tx + picodev.poll = rd_pico_eth_poll; // calls pico_eth_rx + picodev.mtu = tap->_mtu; + picodev.tap = tap; + uint8_t mac[PICO_SIZE_ETH]; + tap->_mac.copyTo(mac, PICO_SIZE_ETH); + if (pico_device_init(&picodev, tap->vtap_abbr_name, mac) != 0) { + DEBUG_ERROR("dev init failed"); + err = false; + } + picodev_initialized = true; + err = true; + } + _picostack_driver_lock.unlock(); + return err; +} + +bool pico_register_address(VirtualTap *tap, const InetAddress &ip) +{ + _picostack_driver_lock.lock(); + bool err = false; + char ipbuf[INET6_ADDRSTRLEN]; + uint8_t hwaddr[6]; + // register addresses + if (ip.isV4()) { + struct pico_ip4 ipaddr, netmask; + ipaddr.addr = *((uint32_t *)ip.rawIpData()); + netmask.addr = *((uint32_t *)ip.netmask().rawIpData()); + pico_ipv4_link_add(&picodev, ipaddr, netmask); + DEBUG_INFO("addr=%s", ip.toString(ipbuf)); + tap->_mac.copyTo(hwaddr, 6); + char macbuf[ZT_MAC_ADDRSTRLEN]; + mac2str(macbuf, ZT_MAC_ADDRSTRLEN, hwaddr); + DEBUG_INFO("mac=%s", macbuf); + err = true; + } + if (ip.isV6()) { + char ipv6_str[INET6_ADDRSTRLEN], nm_str[INET6_ADDRSTRLEN]; + inet_ntop(AF_INET6, ip.rawIpData(), ipv6_str, INET6_ADDRSTRLEN); + inet_ntop(AF_INET6, ip.netmask().rawIpData(), nm_str, INET6_ADDRSTRLEN); + struct pico_ip6 ipaddr, netmask; + pico_string_to_ipv6(ipv6_str, ipaddr.addr); + pico_string_to_ipv6(nm_str, netmask.addr); + pico_ipv6_link_add(&picodev, ipaddr, netmask); + DEBUG_INFO("addr=%s", ipv6_str); + tap->_mac.copyTo(hwaddr, 6); + char macbuf[ZT_MAC_ADDRSTRLEN]; + mac2str(macbuf, ZT_MAC_ADDRSTRLEN, hwaddr); + DEBUG_INFO("mac=%s", macbuf); + err = true; + } + _picostack_driver_lock.unlock(); + return err; +} + +// TODO: +// pico_ipv6_route_add +// pico_ipv6_route_del + +bool rd_pico_route_add(VirtualTap *tap, const InetAddress &addr, const InetAddress &nm, const InetAddress &gw, int metric) +{ + struct pico_ipv4_link *link = NULL; + struct pico_ip4 address; + address.addr = *((uint32_t *)addr.rawIpData()); + struct pico_ip4 netmask; + netmask.addr = *((uint32_t *)nm.rawIpData()); + struct pico_ip4 gateway; + gateway.addr = *((uint32_t *)gw.rawIpData()); + int err = pico_ipv4_route_add(address, netmask, gateway, metric, link); + if (err) { + DEBUG_ERROR("err=%d, %s", err, beautify_pico_error(pico_err)); + } + return err; +} + +bool rd_pico_route_del(VirtualTap *tap, const InetAddress &addr, const InetAddress &nm, int metric) +{ + struct pico_ip4 address; + address.addr = *((uint32_t *)addr.rawIpData()); + struct pico_ip4 netmask; + netmask.addr = *((uint32_t *)nm.rawIpData()); + int err = pico_ipv4_route_del(address, netmask, metric); + if (err) { + DEBUG_ERROR("err=%d, %s", err, beautify_pico_error(pico_err)); + } + return err; +} + +int rd_pico_add_dns_nameserver(struct sockaddr *addr) +{ + int err = errno = 0; + // TODO: De-complexify this + struct pico_ip4 ns; + memset(&ns, 0, sizeof (struct pico_ip4)); + struct sockaddr_in *in4 = (struct sockaddr_in*)addr; + char ipv4_str[INET_ADDRSTRLEN]; + inet_ntop(AF_INET, (const void *)&in4->sin_addr.s_addr, ipv4_str, INET_ADDRSTRLEN); + uint32_t ipval = 0; + pico_string_to_ipv4(ipv4_str, &ipval); + ns.addr = ipval; + if ((err = pico_dns_client_nameserver(&ns, PICO_DNS_NS_ADD)) < 0) { + DEBUG_ERROR("error while adding DNS nameserver, err=%d, pico_err=%d, %s", + err, pico_err, beautify_pico_error(pico_err)); + map_pico_err_to_errno(pico_err); + } + return err; +} + +int rd_pico_del_dns_nameserver(struct sockaddr *addr) +{ + int err = errno = 0; + // TODO: De-complexify this + struct pico_ip4 ns; + memset(&ns, 0, sizeof (struct pico_ip4)); + struct sockaddr_in *in4 = (struct sockaddr_in*)addr; + char ipv4_str[INET_ADDRSTRLEN]; + inet_ntop(AF_INET, (const void *)&in4->sin_addr.s_addr, ipv4_str, INET_ADDRSTRLEN); + uint32_t ipval = 0; + pico_string_to_ipv4(ipv4_str, &ipval); + ns.addr = ipval; + if ((err = pico_dns_client_nameserver(&ns, PICO_DNS_NS_DEL)) < 0) { + DEBUG_ERROR("error while removing DNS nameserver, err=%d, pico_err=%d, %s", + err, pico_err, beautify_pico_error(pico_err)); + } + return err; +} + +void rd_pico_loop(VirtualTap *tap) +{ + while (tap->_run) + { + tap->_phy.poll(ZT_PHY_POLL_INTERVAL); + pico_stack_tick(); + tap->Housekeeping(); + } +} + +// from stack socket to app socket +void rd_pico_cb_tcp_read(VirtualTap *tap, struct pico_socket *s) +{ + VirtualSocket *vs = (VirtualSocket*)(((VirtualBindingPair*)s->priv)->vs); + if (vs == NULL) { + DEBUG_ERROR("s->priv yielded no valid vs"); + return; + } + Mutex::Lock _l(vs->_rx_m); + if (tap == NULL) { + DEBUG_ERROR("invalid tap"); + return; + } + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return; + } + int r; + uint16_t port = 0; + union { + struct pico_ip4 ip4; + struct pico_ip6 ip6; + } peer; + + do { + int n = 0; + int avail = ZT_TCP_RX_BUF_SZ - vs->RXbuf->count(); + if (avail) { + r = pico_socket_recvfrom(s, vs->RXbuf->get_buf(), ZT_STACK_SOCKET_RD_MAX, + (void *)&peer.ip4.addr, &port); + if (r > 0) + { + vs->RXbuf->produce(r); + n = tap->_phy.streamSend(vs->sock, vs->RXbuf->get_buf(), r); + + if (n>0) + vs->RXbuf->consume(n); + } + if (vs->RXbuf->count() == 0) { + tap->_phy.setNotifyWritable(vs->sock, false); + } + else { + tap->_phy.setNotifyWritable(vs->sock, true); + } + } + else { + //tap->_phy.setNotifyWritable(vs->sock, false); + DEBUG_ERROR("not enough space left on I/O RX buffer for pico_socket(%p)", s); + } + } + while (r > 0); +} + +// from stack socket to app socket +void rd_pico_cb_udp_read(VirtualTap *tap, struct pico_socket *s) +{ + // DEBUG_INFO(); + VirtualSocket *vs = (VirtualSocket*)(((VirtualBindingPair*)s->priv)->vs); + if (vs == NULL) { + DEBUG_ERROR("s->priv yielded no valid vs"); + return; + } + Mutex::Lock _l(vs->_rx_m); + if (tap == NULL) { + DEBUG_ERROR("invalid tap"); + return; + } + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return; + } + + uint16_t port = 0; + union { + struct pico_ip4 ip4; + struct pico_ip6 ip6; + } peer; + int r = 0, w = 0; + // TODO: Consolidate this + if (vs->socket_family == AF_INET) { + struct sockaddr_in in4; + char udp_payload_buf[ZT_MAX_MTU]; + if ((r = pico_socket_recvfrom(s, udp_payload_buf, ZT_SDK_MTU, (void *)&peer.ip4.addr, &port)) < 0) { + DEBUG_ERROR("err=%d, %s", r, beautify_pico_error(pico_err)); + } + in4.sin_addr.s_addr = peer.ip4.addr; + in4.sin_port = port; + // immediately attempt to write addr and payload to app socket. The idea is that the zts_recvfrom() has + // been called and will pick this up and correctly handle it + char udp_msg_buf[ZT_SOCKET_MSG_BUF_SZ]; // [sz : addr : payload] + int32_t len = sizeof(struct sockaddr_storage) + r; + int32_t tot_len = sizeof(int32_t) + len; + memcpy(udp_msg_buf, &len, sizeof(int32_t)); // len: sockaddr+payload + memcpy(udp_msg_buf + sizeof(int32_t), &in4, sizeof(struct sockaddr_storage)); // sockaddr + memcpy(udp_msg_buf + sizeof(int32_t) + sizeof(struct sockaddr_storage), &udp_payload_buf, r); // payload + if ((w = write(vs->sdk_fd, udp_msg_buf, tot_len)) < 0) { + DEBUG_ERROR("write()=%d, errno=%d", w, errno); + } + } + if (vs->socket_family == AF_INET6) { + struct sockaddr_in6 in6; + char udp_payload_buf[ZT_MAX_MTU]; + if ((r = pico_socket_recvfrom(s, udp_payload_buf, ZT_SDK_MTU, (void *)&peer.ip6.addr, &port)) < 0) { + DEBUG_ERROR("err=%d, %s", r, beautify_pico_error(pico_err)); + } + memcpy(&(in6.sin6_addr.s6_addr), &(peer.ip6.addr), sizeof(peer.ip6.addr)); + in6.sin6_port = port; + // immediately attempt to write addr and payload to app socket. The idea is that the zts_recvfrom() has + // been called and will pick this up and correctly handle it + char udp_msg_buf[ZT_SOCKET_MSG_BUF_SZ]; // [sz : addr : payload] + int32_t len = sizeof(struct sockaddr_storage) + r; + int32_t tot_len = sizeof(int32_t) + len; + memcpy(udp_msg_buf, &len, sizeof(int32_t)); // len: sockaddr+payload + memcpy(udp_msg_buf + sizeof(int32_t), &in6, sizeof(struct sockaddr_storage)); // sockaddr + memcpy(udp_msg_buf + sizeof(int32_t) + sizeof(struct sockaddr_storage), &udp_payload_buf, r); // payload + if ((w = write(vs->sdk_fd, udp_msg_buf, tot_len)) < 0) { + DEBUG_ERROR("write()=%d, errno=%d", w, errno); + } + } +} + +void rd_pico_cb_tcp_write(VirtualTap *tap, struct pico_socket *s) +{ + VirtualSocket *vs = (VirtualSocket*)(((VirtualBindingPair*)s->priv)->vs); + if (vs == NULL) { + DEBUG_EXTRA("vs == NULL"); + return; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + if (ps != s) { + DEBUG_ERROR("ps != s, bad callback"); + return; + } + // we will get the vs->TXBuf->get_buf() reference from within pico_Write + rd_pico_write(vs, NULL, vs->TXbuf->count()); +} + +void rd_pico_cb_socket_ev(uint16_t ev, struct pico_socket *s) +{ + int err = 0; + //DEBUG_EXTRA("s=%p, s->state=%d %s", s, s->state, beautify_pico_state(s->state)); + + // --- handle error events --- + + // PICO_SOCK_EV_FIN - triggered when the socket is closed. No further communication is + // possible from this point on the socket. + if (ev & PICO_SOCK_EV_FIN) { + DEBUG_EXTRA("PICO_SOCK_EV_FIN (socket closed), picosock=%p", s); + //DEBUG_EXTRA("PICO_SOCK_EV_FIN (socket closed), picosock=%p, vs=%p, app_fd=%d, sdk_fd=%d", s, vs, vs->app_fd, vs->sdk_fd); + } + + // PICO_SOCK_EV_ERR - triggered when an error occurs. + if (ev & PICO_SOCK_EV_ERR) { + if (pico_err == PICO_ERR_ECONNRESET) { + DEBUG_ERROR("PICO_ERR_ECONNRESET"); + } + //DEBUG_ERROR("PICO_SOCK_EV_ERR, err=%s, picosock=%p, app_fd=%d, sdk_fd=%d", + // beautify_pico_error(pico_err), s, vs->app_fd, vs->sdk_fd); + } + // PICO_SOCK_EV_CLOSE - triggered when a FIN segment is received (TCP only). This event + // indicates that the oher endpont has closed the VirtualSocket, so the local TCP layer is only + // allowed to send new data until a local shutdown or close is initiated. PicoTCP is able to + // keep the VirtualSocket half-open (only for sending) after the FIN packet has been received, + // allowing new data to be sent in the TCP CLOSE WAIT state. + + VirtualBindingPair *vbp = (VirtualBindingPair*)(s->priv); + if (vbp == NULL) { + DEBUG_ERROR("s->priv yielded no valid vbp"); + return; + } + VirtualTap *tap = static_cast<VirtualTap*>(vbp->tap); + VirtualSocket *vs = static_cast<VirtualSocket*>(vbp->vs); + + if (ev & PICO_SOCK_EV_CLOSE) { + vs->set_state(VS_STATE_CLOSED); + if ((err = pico_socket_shutdown(s, PICO_SHUT_RDWR)) < 0) { + DEBUG_ERROR("error while shutting down socket"); + } + if ((err = pico_socket_close(s)) < 0) { + DEBUG_ERROR("pico_socket_close()=%d, pico_err=%d, %s", err, pico_err, beautify_pico_error(pico_err)); + } + DEBUG_EXTRA("PICO_SOCK_EV_CLOSE (socket closure) err=%d (%s), picosock=%p", pico_err, beautify_pico_error(pico_err), s); + return; + } + + // --- handle non-error events --- + + if (vs == NULL) { + DEBUG_ERROR("invalid VirtualSocket"); + return; + } + // PICO_SOCK_EV - triggered when VirtualSocket is established (TCP only). This event is + // received either after a successful call to pico socket vsect to indicate that the VirtualSocket + // has been established, or on a listening socket, indicating that a call to pico socket accept + // may now be issued in order to accept the incoming VirtualSocket from a remote host. + if (ev & PICO_SOCK_EV_CONN) { + DEBUG_EXTRA("PICO_SOCK_EV_CONN"); + if (vs->get_state() == VS_STATE_LISTENING) { + uint16_t port; + struct pico_socket *client_psock = nullptr; + struct pico_ip4 orig4; + struct pico_ip6 orig6; + if (vs->socket_family == AF_INET) { // NOTE: p->net->proto_number == PICO_PROTO_IPV4 + client_psock = pico_socket_accept(s, &orig4, &port); + } + if (vs->socket_family == AF_INET6) { // NOTE: p->net->proto_number == PICO_PROTO_IPV4 + client_psock = pico_socket_accept(s, &orig6, &port); + } + if (client_psock == NULL) { + DEBUG_ERROR("pico_socket_accept(): pico_socket=%p, pico_err=%d, %s", s, pico_err, beautify_pico_error(pico_err)); + return; + } + // Create a new VirtualSocket and add it to the queue, + // some time in the future a call to zts_multiplex_accept() will pick up + // this new VirtualSocket, add it to the VirtualSocket list and return its + // VirtualSocket->sock to the application + VirtualSocket *new_vs = new VirtualSocket(); + new_vs->socket_type = SOCK_STREAM; + struct pico_socket *new_ps = (struct pico_socket*)(new_vs->pcb); + new_ps = client_psock; + // TODO: Condense this + if (vs->socket_family == AF_INET) { + char addrstr[INET_ADDRSTRLEN]; + struct sockaddr_storage ss4; + struct sockaddr_in *in4 = (struct sockaddr_in *)&ss4; + in4->sin_addr.s_addr = orig4.addr; + in4->sin_port = Utils::hton(port); + memcpy(&(new_vs->peer_addr), in4, sizeof(new_vs->peer_addr)); + inet_ntop(AF_INET, &(in4->sin_addr), addrstr, INET_ADDRSTRLEN); + DEBUG_EXTRA("accepted connection from: %s : %d", addrstr, port); + ZeroTier::InetAddress inet; + inet.fromString(addrstr); + new_vs->tap = getTapByAddr(&inet); // assign to tap based on incoming address + } + if (vs->socket_family == AF_INET6) { + char addrstr[INET6_ADDRSTRLEN]; + struct sockaddr_in6 in6; + memcpy(&(in6.sin6_addr.s6_addr), &orig6, sizeof(in6.sin6_addr.s6_addr)); + in6.sin6_port = Utils::hton(port); + memcpy(&(new_vs->peer_addr), &in6, sizeof(new_vs->peer_addr)); + inet_ntop(AF_INET6, &(in6.sin6_addr), addrstr, INET6_ADDRSTRLEN); + DEBUG_EXTRA("accepted connection from: %s : %d", addrstr, port); + ZeroTier::InetAddress inet; + inet.fromString(addrstr); + new_vs->tap = getTapByAddr(&inet); // assign to tap based on incoming address + } + if (new_vs->tap == NULL) { + DEBUG_ERROR("no valid VirtualTap could be found"); + return; + } + // Assign this VirtualSocket to the appropriate VirtualTap + new_ps->priv = new VirtualBindingPair(new_vs->tap,new_vs); + new_vs->tap->addVirtualSocket(new_vs); + vs->_AcceptedConnections.push(new_vs); + new_vs->sock = new_vs->tap->_phy.wrapSocket(new_vs->sdk_fd, new_vs); + } + if (vs->get_state() != VS_STATE_LISTENING) { + // set state so socket multiplexer logic will pick this up + vs->set_state(VS_STATE_UNHANDLED_CONNECTED); + } + } + // PICO_SOCK_EV_RD - triggered when new data arrives on the socket. A new receive action + // can be taken by the socket owner because this event indicates there is new data to receive. + if (ev & PICO_SOCK_EV_RD) { + if (vs->socket_type==SOCK_STREAM) + rd_pico_cb_tcp_read(tap, s); + if (vs->socket_type==SOCK_DGRAM) + rd_pico_cb_udp_read(tap, s); + } + // PICO_SOCK_EV_WR - triggered when ready to write to the socket. Issuing a write/send call + // will now succeed if the buffer has enough space to allocate new outstanding data + if (ev & PICO_SOCK_EV_WR) { + rd_pico_cb_tcp_write(tap, s); + } +} + +int rd_pico_eth_tx(struct pico_device *dev, void *buf, int len) +{ + //DEBUG_TRANS(); + //_picostack_driver_lock.lock(); + VirtualTap *tap = static_cast<VirtualTap*>(dev->tap); + if (tap == NULL) { + DEBUG_ERROR("invalid dev->tap"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_eth_hdr *ethhdr; + ethhdr = (struct pico_eth_hdr *)buf; + MAC src_mac; + MAC dest_mac; + src_mac.setTo(ethhdr->saddr, 6); + dest_mac.setTo(ethhdr->daddr, 6); + if (ZT_MSG_TRANSFER == true) { + char macBuf[ZT_MAC_ADDRSTRLEN], nodeBuf[ZTO_ID_LEN]; + mac2str(macBuf, ZT_MAC_ADDRSTRLEN, ethhdr->daddr); + ZeroTier::MAC mac; + mac.setTo(ethhdr->daddr, 6); + mac.toAddress(tap->_nwid).toString(nodeBuf); + + char flagbuf[32]; + memset(&flagbuf, 0, 32); +/* + struct pico_tcp_hdr *hdr; + void * tcp_hdr_ptr; + if (Utils::ntoh(ethhdr->proto) == 0x86dd) { // tcp, ipv6 + tcp_hdr_ptr = ðhdr + PICO_SIZE_ETHHDR + PICO_SIZE_IP4HDR; + } + + if (Utils::ntoh(ethhdr->proto) == 0x0800) // tcp + { + tcp_hdr_ptr = &buf + PICO_SIZE_ETHHDR + PICO_SIZE_IP4HDR; + hdr = (struct pico_tcp_hdr *)tcp_hdr_ptr; + + if (hdr) { + char *flag_ptr = flagbuf; + + if (hdr->flags & PICO_TCP_PSH) { + sprintf(flag_ptr, "PSH "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_SYN) { + sprintf(flag_ptr, "SYN "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_ACK) { + sprintf(flag_ptr, "ACK "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_FIN) { + sprintf(flag_ptr, "FIN "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_RST) { + sprintf(flag_ptr, "RST "); + flag_ptr+=4; + } + } + } +*/ + DEBUG_TRANS("len=%5d dst=%s [%s TX <-- %s] proto=0x%04x %s %s", len, macBuf, nodeBuf, tap->nodeId().c_str(), + Utils::ntoh(ethhdr->proto), beautify_eth_proto_nums(Utils::ntoh(ethhdr->proto)), flagbuf); + } + tap->_handler(tap->_arg,NULL,tap->_nwid,src_mac,dest_mac, + Utils::ntoh((uint16_t)ethhdr->proto), 0, ((char*)buf) + + sizeof(struct pico_eth_hdr),len - sizeof(struct pico_eth_hdr)); + //_picostack_driver_lock.unlock(); + return len; +} + +// receive frames from zerotier virtual wire and copy them to a guarded buffer awaiting placement into network stack +void rd_pico_eth_rx(VirtualTap *tap, const MAC &from,const MAC &to,unsigned int etherType, + const void *data,unsigned int len) +{ + //DEBUG_TRANS(); + //_picostack_driver_lock.lock(); + if (tap == NULL) { + DEBUG_ERROR("invalid tap"); + return; + } + // Since picoTCP only allows the reception of frames from within the polling function, we + // must enqueue each frame into a memory structure shared by both threads. This structure will + Mutex::Lock _l(tap->_pico_frame_rxbuf_m); + // assemble new eth header + struct pico_eth_hdr ethhdr; + from.copyTo(ethhdr.saddr, 6); + to.copyTo(ethhdr.daddr, 6); + ethhdr.proto = Utils::hton((uint16_t)etherType); + int32_t msg_len = len + sizeof(int32_t) + sizeof(struct pico_eth_hdr); + + if (ZT_MSG_TRANSFER == true) { + char macBuf[ZT_MAC_ADDRSTRLEN], nodeBuf[ZTO_ID_LEN]; + mac2str(macBuf, sizeof(macBuf), ethhdr.saddr); + ZeroTier::MAC mac; + mac.setTo(ethhdr.saddr, 6); + mac.toAddress(tap->_nwid).toString(nodeBuf); + + char flagbuf[64]; + memset(&flagbuf, 0, 64); +/* + struct pico_tcp_hdr *hdr; + void * tcp_hdr_ptr; + if (etherType == 0x86dd) { // tcp, ipv6 + tcp_hdr_ptr = ðhdr + PICO_SIZE_ETHHDR + PICO_SIZE_IP4HDR; + } + + if (etherType == 0x0800) // tcp, ipv4 + { + tcp_hdr_ptr = ðhdr + PICO_SIZE_ETHHDR + PICO_SIZE_IP4HDR; + hdr = (struct pico_tcp_hdr *)tcp_hdr_ptr; + if (hdr) { + char *flag_ptr = flagbuf; + + if (hdr->flags & PICO_TCP_PSH) { + sprintf(flag_ptr, "PSH "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_SYN) { + sprintf(flag_ptr, "SYN "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_ACK) { + sprintf(flag_ptr, "ACK "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_FIN) { + sprintf(flag_ptr, "FIN "); + flag_ptr+=4; + } + if (hdr->flags & PICO_TCP_RST) { + sprintf(flag_ptr, "RST "); + flag_ptr+=4; + } + } + } +*/ + DEBUG_TRANS("len=%5d src=%s [%s RX --> %s] proto=0x%04x %s %s", len, macBuf, nodeBuf, tap->nodeId().c_str(), + etherType, beautify_eth_proto_nums(etherType), flagbuf); + } + // write virtual ethernet frame to guarded buffer (emptied by pico_eth_poll()) + memcpy(tap->pico_frame_rxbuf + tap->pico_frame_rxbuf_tot, &msg_len, sizeof(int32_t)); // size of frame + meta + memcpy(tap->pico_frame_rxbuf + tap->pico_frame_rxbuf_tot + sizeof(int32_t), ðhdr, sizeof(ethhdr)); // new eth header + memcpy(tap->pico_frame_rxbuf + tap->pico_frame_rxbuf_tot + sizeof(int32_t) + sizeof(ethhdr), data, len); // frame data + tap->pico_frame_rxbuf_tot += msg_len; + //_picostack_driver_lock.unlock(); +} + +// feed frames on the guarded RX buffer (from zerotier virtual wire) into the network stack +int rd_pico_eth_poll(struct pico_device *dev, int loop_score) +{ + VirtualTap *tap = static_cast<VirtualTap*>(dev->tap); + if (tap == NULL) { + DEBUG_ERROR("invalid dev->tap"); + return ZT_ERR_GENERAL_FAILURE; + } + // TODO: Optimize (use Ringbuffer) + Mutex::Lock _l(tap->_pico_frame_rxbuf_m); + unsigned char frame[ZT_SDK_MTU]; + int32_t len, err = 0; + while (tap->pico_frame_rxbuf_tot > 0 && loop_score > 0) { + memset(frame, 0, sizeof(frame)); + len = 0; + // get frame len + memcpy(&len, tap->pico_frame_rxbuf, sizeof(int32_t)); + if (len > sizeof(int32_t)) { // meaning, since we package the len in the msg, we don't want to recv a 0-(sizeof(int32_t)) sized frame + memcpy(frame, tap->pico_frame_rxbuf + sizeof(int32_t), len-(sizeof(int32_t)) ); // get frame data + memmove(tap->pico_frame_rxbuf, tap->pico_frame_rxbuf + len, MAX_PICO_FRAME_RX_BUF_SZ-len); // shift buffer + if ((err = pico_stack_recv(dev, (uint8_t*)frame, (len-sizeof(int32_t)))) < 0) { + DEBUG_ERROR("pico_stack_recv(), err=%d, pico_err=%d, %s", err, pico_err, picostack->beautify_pico_error(pico_err)); + } + tap->pico_frame_rxbuf_tot-=len; + } + else { + DEBUG_ERROR("invalid frame size (%d)",len); + } + loop_score--; + } + return loop_score; +} + +int rd_pico_socket(struct pico_socket **p, int socket_family, int socket_type, int protocol) +{ + int err = 0; + if (virt_can_provision_new_socket(socket_type) == false) { + DEBUG_ERROR("cannot create additional socket, see PICO_MAX_TIMERS. current=%d", pico_ntimers()); + errno = EMFILE; + err = -1; + } + else { + int protocol_version = 0; + struct pico_socket *psock; + if (socket_family == AF_INET) { + protocol_version = PICO_PROTO_IPV4; + } + if (socket_family == AF_INET6) { + protocol_version = PICO_PROTO_IPV6; + } + if (socket_type == SOCK_DGRAM) { + psock = pico_socket_open(protocol_version, PICO_PROTO_UDP, &rd_pico_cb_socket_ev); + if (psock) { + // configure size of UDP SND/RCV buffers + // TODO + } + } + if (socket_type == SOCK_STREAM) { + psock = pico_socket_open(protocol_version, PICO_PROTO_TCP, &rd_pico_cb_socket_ev); + if (psock) { + // configure size of TCP SND/RCV buffers + int tx_buf_sz = ZT_STACK_TCP_SOCKET_TX_SZ; + int rx_buf_sz = ZT_STACK_TCP_SOCKET_RX_SZ; + int t_err = 0; + if ((t_err = pico_socket_setoption(psock, PICO_SOCKET_OPT_SNDBUF, &tx_buf_sz)) < 0) { + DEBUG_ERROR("unable to set SNDBUF size, err=%d, pico_err=%d, %s", + t_err, pico_err, beautify_pico_error(pico_err)); + } + if ((t_err = pico_socket_setoption(psock, PICO_SOCKET_OPT_RCVBUF, &rx_buf_sz)) < 0) { + DEBUG_ERROR("unable to set RCVBUF size, err=%d, pico_err=%d, %s", + t_err, pico_err, beautify_pico_error(pico_err)); + } + } + } + *p = psock; + } + return err; +} + +int rd_pico_connect(VirtualSocket *vs, const struct sockaddr *addr, socklen_t addrlen) +{ + if (vs == NULL || vs->pcb == NULL) { + DEBUG_ERROR("invalid vs or ps"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + int err = 0; + if (vs->socket_family == AF_INET) { + struct pico_ip4 zaddr; + memset(&zaddr, 0, sizeof (struct pico_ip4)); + struct sockaddr_in *in4 = (struct sockaddr_in*)addr; + char ipv4_str[INET_ADDRSTRLEN]; + inet_ntop(AF_INET, (const void *)&in4->sin_addr.s_addr, ipv4_str, INET_ADDRSTRLEN); + uint32_t ipval = 0; + pico_string_to_ipv4(ipv4_str, &ipval); + zaddr.addr = ipval; + if (vs->socket_type == SOCK_STREAM) { // connect is an implicit call for non-connection-based VirtualSockets + DEBUG_EXTRA("connecting to addr=%s port=%d", ipv4_str, Utils::ntoh(in4->sin_port)); + } + err = pico_socket_connect(ps, &zaddr, in4->sin_port); + } + if (vs->socket_family == AF_INET6) { + struct pico_ip6 zaddr; + struct sockaddr_in6 *in6 = (struct sockaddr_in6*)addr; + char ipv6_str[INET6_ADDRSTRLEN]; + inet_ntop(AF_INET6, &(in6->sin6_addr), ipv6_str, INET6_ADDRSTRLEN); + pico_string_to_ipv6(ipv6_str, zaddr.addr); + if (vs->socket_type == SOCK_STREAM) { + DEBUG_EXTRA("connecting to addr=%s port=%d", ipv6_str, Utils::ntoh(in6->sin6_port)); + } + err = pico_socket_connect(ps, &zaddr, in6->sin6_port); + } + if (err) { + DEBUG_ERROR("error connecting pico_socket=%p, err=%d, pico_err=%d, %s", + ps, err, pico_err, beautify_pico_error(pico_err)); + return map_pico_err_to_errno(pico_err); + } + memcpy(&(vs->peer_addr), &addr, sizeof(struct sockaddr_storage)); + return err; +} + +int rd_pico_bind(VirtualSocket *vs, const struct sockaddr *addr, socklen_t addrlen) +{ + if (vs == NULL || vs->pcb == NULL) { + DEBUG_ERROR("invalid vs or ps"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + int err = 0; + if (vs->socket_family == AF_INET) { + struct pico_ip4 zaddr; + uint32_t tempaddr; + memset(&zaddr, 0, sizeof (struct pico_ip4)); + struct sockaddr_in *in4 = (struct sockaddr_in*)addr; + char ipv4_str[INET_ADDRSTRLEN]; + inet_ntop(AF_INET, (const void *)&in4->sin_addr.s_addr, ipv4_str, INET_ADDRSTRLEN); + pico_string_to_ipv4(ipv4_str, &tempaddr); + zaddr.addr = tempaddr; + DEBUG_EXTRA("binding to addr=%s port=%d", ipv4_str, Utils::ntoh(in4->sin_port)); + err = pico_socket_bind(ps, &zaddr, (uint16_t *)&(in4->sin_port)); + } + if (vs->socket_family == AF_INET6) { + struct pico_ip6 pip6; + struct sockaddr_in6 *in6 = (struct sockaddr_in6*)addr; + char ipv6_str[INET6_ADDRSTRLEN]; + inet_ntop(AF_INET6, &(in6->sin6_addr), ipv6_str, INET6_ADDRSTRLEN); + // TODO: This isn't proper + pico_string_to_ipv6("::", pip6.addr); + DEBUG_EXTRA("binding to addr=%s port=%d", ipv6_str, Utils::ntoh(in6->sin6_port)); + err = pico_socket_bind(ps, &pip6, (uint16_t *)&(in6->sin6_port)); + } + if (err < 0) { + DEBUG_ERROR("unable to bind pico_socket=%p, err=%d, pico_err=%d, %s", + (ps), err, pico_err, beautify_pico_error(pico_err)); + return map_pico_err_to_errno(pico_err); + } + return err; +} + +int rd_pico_listen(VirtualSocket *vs, int backlog) +{ + if (vs == NULL || vs->pcb == NULL) { + DEBUG_ERROR("invalid vs or ps"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + int err = 0; + if ((err = pico_socket_listen(ps, backlog)) < 0) { + DEBUG_ERROR("error putting pico_socket=%p into listening state. err=%d, pico_err=%d, %s", + ps, err, pico_err, beautify_pico_error(pico_err)); + return map_pico_err_to_errno(pico_err); + } + vs->set_state(VS_STATE_LISTENING); + return ZT_ERR_OK; +} + +VirtualSocket* rd_pico_accept(VirtualSocket *vs) +{ + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return NULL; + } + // Retreive first of queued VirtualSockets from parent VirtualSocket + VirtualSocket *new_vs = NULL; + if (vs->_AcceptedConnections.size()) { + new_vs = vs->_AcceptedConnections.front(); + vs->_AcceptedConnections.pop(); + } + return new_vs; +} + +int rd_pico_read(VirtualTap *tap, PhySocket *sock, VirtualSocket* vs, bool stack_invoked) +{ + // DEBUG_INFO(); + // Vestigial + return 0; +} + +int rd_pico_write(VirtualSocket *vs, void *data, ssize_t len) +{ + int err = 0; + void *src_buf = NULL; + // TODO: Add RingBuffer overflow checks + DEBUG_EXTRA("vs=%p, fd=%d, data=%p, len=%d", vs, vs->app_fd, data, len); + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + Mutex::Lock _l(vs->_tx_m); + if (ps == NULL) { + DEBUG_ERROR("ps == NULL"); + return -1; + } + if (vs->app_fd <= 0) { + DEBUG_EXTRA("invalid fd"); + return -1; + } + if (ps->state & PICO_SOCKET_STATE_CLOSED) { + DEBUG_ERROR("socket is PICO_SOCKET_STATE_CLOSED, this pico_tcp_write() will fail"); + return -1; + } + if (vs == NULL) { + DEBUG_ERROR("invalid VirtualSocket (len=%d)", len); + return -1; + } + if (vs->socket_type == SOCK_DGRAM) { + if (data == NULL) { + DEBUG_ERROR("data == NULL"); + return -1; + } + if (len <= 0) { + DEBUG_ERROR("invalid write len=%d for SOCK_DGRAM", len); + return -1; + } + int r; + if ((r = pico_socket_write(ps, data, len)) < 0) { + DEBUG_ERROR("unable to write to picosock=%p, err=%d, pico_err=%d, %s", + ps, r, pico_err, beautify_pico_error(pico_err)); + err = -1; + } + else { + err = r; // successful write + } + if (vs->socket_type == SOCK_DGRAM) { + DEBUG_TRANS("len=%5d buf_len=N/A [APPFDS --> NSPICO] proto=0x%04x (UDP)", r, PICO_PROTO_TCP); + } + } + if (vs->socket_type == SOCK_STREAM) { + if (len > 0 && data != NULL) { + + src_buf = data; // --- Data source: poll loop I/O buffer --- + + // in this case, we've recieved data on the 'data' buffer, add it to TX ringbuffer, then try to handle it from there + int original_txsz = vs->TXbuf->count(); + if (original_txsz + len >= ZT_TCP_TX_BUF_SZ) { + DEBUG_ERROR("txsz=%d, len=%d", original_txsz, len); + DEBUG_ERROR("TX buffer is too small, try increasing ZT_TCP_TX_BUF_SZ in libzt.h"); + return ZT_ERR_GENERAL_FAILURE; + } + int buf_w = vs->TXbuf->write((const char*)data, len); + if (buf_w != len) { + // because we checked ZT_TCP_TX_BUF_SZ above, this should not happen + DEBUG_ERROR("wrote only len=%d but expected to write len=%d", buf_w, len); + return ZT_ERR_GENERAL_FAILURE; + } + } else if (len == 0 && data == NULL) { + DEBUG_EXTRA("len=0 => write request from poll loop or callback"); + + src_buf = vs->TXbuf->get_buf(); // --- Data source: TX ringbuffer --- + + // do nothing, all the data we need is already on the TX ringbuffer + } else if (len < 0) { + DEBUG_ERROR("invalid write len=%d for SOCK_STREAM", len); + } + + int txsz = vs->TXbuf->count(); + int r, max_write_len = std::min(std::min(txsz, ZT_SDK_MTU),ZT_STACK_SOCKET_WR_MAX); + if ((r = pico_socket_write(ps, src_buf, max_write_len)) < 0) { + DEBUG_ERROR("unable to write to picosock=%p, err=%d, pico_err=%d, %s", + ps, r, pico_err, beautify_pico_error(pico_err)); + err = -1; + } + else { + err = r; // successful write + } + if (r>0) { + vs->TXbuf->consume(r); + if (vs->socket_type == SOCK_STREAM) { + DEBUG_TRANS("len=%5d buf_len=%13d [VSTXBF --> NSPICO] proto=0x%04x (TCP)", r, vs->TXbuf->count(), PICO_PROTO_TCP); + } + } + } + return err; +} + +int rd_pico_close(VirtualSocket *vs) +{ + DEBUG_EXTRA(); + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return ZT_ERR_GENERAL_FAILURE; + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + if (vs->get_state() == VS_STATE_CLOSED) { + DEBUG_EXTRA("socket already in VS_STATE_CLOSED state"); + return 0; + } + if (ps == NULL) { + DEBUG_EXTRA("ps == NULL"); + return 0; + } + if (ps->state & PICO_SOCKET_STATE_CLOSED) { + DEBUG_EXTRA("ps already closed, ps=%p", ps); + return 0; + } + DEBUG_EXTRA("vs=%p, picosock=%p, fd=%d", vs, ps, vs->app_fd); + if (vs == NULL || ps == NULL) + return ZT_ERR_GENERAL_FAILURE; + int err = 0; + Mutex::Lock _l(vs->tap->_tcpconns_m); + if ((err = pico_socket_close(ps)) < 0) { + errno = pico_err; + DEBUG_ERROR("error closing pico_socket, err=%d, pico_err=%d, %s", + err, pico_err, beautify_pico_error(pico_err)); + } + return err; +} + +int rd_pico_shutdown(VirtualSocket *vs, int how) +{ + DEBUG_EXTRA("vs=%p, how=%d", vs, how); + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + int err = 0, mode = 0; + if (how == SHUT_RD) { + mode = PICO_SHUT_RD; + } + if (how == SHUT_WR) { + mode = PICO_SHUT_WR; + } + if (how == SHUT_RDWR) { + mode = PICO_SHUT_RDWR; + } + if ((err = pico_socket_shutdown(ps, mode)) < 0) { + DEBUG_ERROR("error while shutting down socket, fd=%d, pico_err=%d, %s", vs->app_fd, pico_err, beautify_pico_error(pico_err)); + } + return err; +} + +int rd_pico_setsockopt(VirtualSocket *vs, int level, int optname, const void *optval, socklen_t optlen) +{ + int err = -1; + errno = 0; + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return -1; + } else { + DEBUG_EXTRA("fd=%d, level=%d, optname=%d", vs->app_fd, level, optname); + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + if (level == SOL_SOCKET) + { + /* Turns on recording of debugging information. This option enables or disables debugging in the underlying + protocol modules. This option takes an int value. This is a Boolean option.*/ + if (optname == SO_DEBUG) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Specifies that the rules used in validating addresses supplied to bind() should allow reuse of local + addresses, if this is supported by the protocol. This option takes an int value. This is a Boolean option.*/ + if (optname == SO_REUSEADDR) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Keeps connections active by enabling the periodic transmission of messages, if this is supported by the + protocol. This option takes an int value. */ + if (optname == SO_KEEPALIVE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Requests that outgoing messages bypass the standard routing facilities. */ + if (optname == SO_DONTROUTE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Lingers on a close() if data is present. */ + if (optname == SO_LINGER) + { + int linger_time_ms = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_SOCKET_OPT_LINGER, &linger_time_ms)) < 0) { + DEBUG_ERROR("unable to set LINGER, err=%d, pico_err=%d, %s", + err, pico_err, beautify_pico_error(pico_err)); + } + return err; + } + /* Permits sending of broadcast messages, if this is supported by the protocol. This option takes an int + value. This is a Boolean option. */ + if (optname == SO_BROADCAST) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Leaves received out-of-band data (data marked urgent) inline. This option takes an int value. This is a + Boolean option. */ + if (optname == SO_OOBINLINE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Sets send buffer size. This option takes an int value. */ + if (optname == SO_SNDBUF) + { + int no_delay = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_SOCKET_OPT_SNDBUF, &no_delay) < 0)) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while setting PICO_SOCKET_OPT_SNDBUF"); + errno = EINVAL; + err = -1; + } + } + return err; + } + /* Sets receive buffer size. This option takes an int value. */ + if (optname == SO_RCVBUF) + { + int no_delay = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_SOCKET_OPT_RCVBUF, &no_delay) < 0)) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while setting PICO_SOCKET_OPT_RCVBUF"); + errno = EINVAL; + err = -1; + } + } + return err; + } + /* */ + if (optname == SO_STYLE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* */ + if (optname == SO_TYPE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Get error status and clear */ + if (optname == SO_ERROR) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + if (level == IPPROTO_IP) + { + if (optname == IP_ADD_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_ADD_SOURCE_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_BIND_ADDRESS_NO_PORT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_BLOCK_SOURCE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_DROP_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_DROP_SOURCE_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_FREEBIND) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_HDRINCL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MSFILTER) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MTU) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MTU_DISCOVER) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_ALL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_IF) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_LOOP) { + int loop = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_IP_MULTICAST_LOOP, &loop) < 0)) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while setting PICO_IP_MULTICAST_TTL"); + errno = EINVAL; + err = -1; + } + } + return err; + } + if (optname == IP_MULTICAST_TTL) { + int ttl = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_IP_MULTICAST_TTL, &ttl) < 0)) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while setting PICO_IP_MULTICAST_TTL"); + errno = EINVAL; + err = -1; + } + } + return err; + } + if (optname == IP_NODEFRAG) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_OPTIONS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_PKTINFO) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVOPTS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVORIGDSTADDR) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVTOS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVTTL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RETOPTS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_ROUTER_ALERT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TOS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TRANSPARENT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TTL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_UNBLOCK_SOURCE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + // TODO + return -1; + } + if (level == IPPROTO_TCP) + { + struct pico_socket *p = ps; + if (p == NULL) { + return -1; + } + /* If set, don't send out partial frames. */ + if (optname == TCP_CORK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Allow a listener to be awakened only when data arrives on the socket. */ + if (optname == TCP_DEFER_ACCEPT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Used to collect information about this socket. The kernel returns a struct tcp_info as defined in the + file /usr/include/linux/tcp.h.*/ + if (optname == TCP_INFO) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The maximum number of keepalive probes TCP should send before dropping the connection.*/ + if (optname == TCP_KEEPCNT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes, + if the socket option SO_KEEPALIVE has been set on this socket. */ + if (optname == TCP_KEEPIDLE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The time (in seconds) between individual keepalive probes.*/ + if (optname == TCP_KEEPINTVL) { + // TODO + return -1; + } + /* The lifetime of orphaned FIN_WAIT2 state sockets. */ + if (optname == TCP_LINGER2) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The maximum segment size for outgoing TCP packets. */ + if (optname == TCP_MAXSEG) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* If set, disable the Nagle algorithm. */ + if (optname == TCP_NODELAY) { + int no_delay = *((const int*)optval); + if ((err = pico_socket_setoption(ps, PICO_TCP_NODELAY, &no_delay) < 0)) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while disabling Nagle's algorithm"); + errno = EINVAL; + err = -1; + } + } + return err; + } + /* Enable quickack mode if set or disable quickack mode if cleared. */ + if (optname == TCP_QUICKACK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Set the number of SYN retransmits that TCP should send before aborting the attempt to connect. It + cannot exceed 255. */ + if (optname == TCP_SYNCNT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Bound the size of the advertised window to this value. The kernel imposes a minimum size of + SOCK_MIN_RCVBUF/2. */ + if (optname == TCP_WINDOW_CLAMP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + if (level == IPPROTO_UDP) + { + /*If this option is enabled, then all data output on this socket is accumulated into a single + datagram that is transmitted when the option is disabled. */ + if (optname == UDP_CORK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + return err; +} + +int rd_pico_getsockopt(VirtualSocket *vs, int level, int optname, void *optval, socklen_t *optlen) +{ + int err = -1, optval_tmp = 0; + errno = 0; + if (vs == NULL) { + DEBUG_ERROR("invalid vs"); + return -1; + } else { + DEBUG_EXTRA("fd=%d, level=%d, optname=%d", vs->app_fd, level, optname); + } + struct pico_socket *ps = (struct pico_socket*)(vs->pcb); + if (level == SOL_SOCKET) + { + /* Turns on recording of debugging information. This option enables or disables debugging in the underlying + protocol modules. This option takes an int value. This is a Boolean option.*/ + if (optname == SO_DEBUG) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Specifies that the rules used in validating addresses supplied to bind() should allow reuse of local + addresses, if this is supported by the protocol. This option takes an int value. This is a Boolean option.*/ + if (optname == SO_REUSEADDR) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Keeps connections active by enabling the periodic transmission of messages, if this is supported by the + protocol. This option takes an int value. */ + if (optname == SO_KEEPALIVE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Requests that outgoing messages bypass the standard routing facilities. */ + if (optname == SO_DONTROUTE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Lingers on a close() if data is present. */ + if (optname == SO_LINGER) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Permits sending of broadcast messages, if this is supported by the protocol. This option takes an int + value. This is a Boolean option. */ + if (optname == SO_BROADCAST) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Leaves received out-of-band data (data marked urgent) inline. This option takes an int value. This is a + Boolean option. */ + if (optname == SO_OOBINLINE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Sets send buffer size. This option takes an int value. */ + if (optname == SO_SNDBUF) + { + if ((err = pico_socket_getoption(ps, PICO_SOCKET_OPT_SNDBUF, &optval_tmp)) < 0) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while getting PICO_SOCKET_OPT_SNDBUF"); + errno = ENOPROTOOPT; + err = -1; + } + } + memcpy(optval, &optval_tmp, *optlen); + } + /* Sets receive buffer size. This option takes an int value. */ + if (optname == SO_RCVBUF) + { + if ((err = pico_socket_getoption(ps, PICO_SOCKET_OPT_SNDBUF, &optval_tmp)) < 0) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while getting PICO_SOCKET_OPT_RCVBUF"); + errno = ENOPROTOOPT; + err = -1; + } + } + memcpy(optval, &optval_tmp, *optlen); + } + /* */ + if (optname == SO_STYLE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* */ + if (optname == SO_TYPE) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Get error status and clear */ + if (optname == SO_ERROR) + { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + if (level == IPPROTO_IP) + { + if (optname == IP_ADD_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_ADD_SOURCE_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_BIND_ADDRESS_NO_PORT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_BLOCK_SOURCE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_DROP_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_DROP_SOURCE_MEMBERSHIP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_FREEBIND) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_HDRINCL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MSFILTER) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MTU) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MTU_DISCOVER) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_ALL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_IF) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_MULTICAST_LOOP) { + if ((err = pico_socket_getoption(ps, PICO_IP_MULTICAST_LOOP, &optval_tmp)) < 0) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while getting PICO_IP_MULTICAST_TTL"); + errno = ENOPROTOOPT; + err = -1; + } + } + memcpy(optval, &optval_tmp, *optlen); + } + if (optname == IP_MULTICAST_TTL) { + if ((err = pico_socket_getoption(ps, PICO_IP_MULTICAST_TTL, &optval_tmp)) < 0) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while getting PICO_IP_MULTICAST_TTL"); + errno = ENOPROTOOPT; + err = -1; + } + } + memcpy(optval, &optval_tmp, *optlen); + } + if (optname == IP_NODEFRAG) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_OPTIONS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_PKTINFO) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVOPTS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVORIGDSTADDR) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVTOS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RECVTTL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_RETOPTS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_ROUTER_ALERT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TOS) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TRANSPARENT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_TTL) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + if (optname == IP_UNBLOCK_SOURCE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + // TODO + return -1; + } + if (level == IPPROTO_TCP) + { + struct pico_socket *p = ps; + if (p == NULL) { + return -1; + } + /* If set, don't send out partial frames. */ + if (optname == TCP_CORK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Allow a listener to be awakened only when data arrives on the socket. */ + if (optname == TCP_DEFER_ACCEPT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Used to collect information about this socket. */ + if (optname == TCP_INFO) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The maximum number of keepalive probes TCP should send before dropping the connection.*/ + if (optname == TCP_KEEPCNT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes, + if the socket option SO_KEEPALIVE has been set on this socket. */ + if (optname == TCP_KEEPIDLE) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The time (in seconds) between individual keepalive probes.*/ + if (optname == TCP_KEEPINTVL) { + // TODO + return -1; + } + /* The lifetime of orphaned FIN_WAIT2 state sockets. */ + if (optname == TCP_LINGER2) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* The maximum segment size for outgoing TCP packets. */ + if (optname == TCP_MAXSEG) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* If set, disable the Nagle algorithm. */ + if (optname == TCP_NODELAY) { + if ((err = pico_socket_getoption(ps, PICO_TCP_NODELAY, &optval_tmp)) < 0) { + if (err == PICO_ERR_EINVAL) { + DEBUG_ERROR("error while disabling Nagle's algorithm"); + errno = ENOPROTOOPT; + err = -1; + } + } + memcpy(optval, &optval_tmp, *optlen); + return err; + } + /* Enable quickack mode if set or disable quickack mode if cleared. */ + if (optname == TCP_QUICKACK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Set the number of SYN retransmits that TCP should send before aborting the attempt to connect. It + cannot exceed 255. */ + if (optname == TCP_SYNCNT) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + /* Bound the size of the advertised window to this value. The kernel imposes a minimum size of + SOCK_MIN_RCVBUF/2. */ + if (optname == TCP_WINDOW_CLAMP) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + if (level == IPPROTO_UDP) + { + /*If this option is enabled, then all data output on this socket is accumulated into a single + datagram that is transmitted when the option is disabled. */ + if (optname == UDP_CORK) { + // TODO + errno = ENOPROTOOPT; + return -1; + } + } + return err; +} + +int map_pico_err_to_errno(int err) +{ + if (err == PICO_ERR_NOERR) { errno = 0; return 0; } // + if (err == PICO_ERR_EPERM) { errno = ENXIO; } + if (err == PICO_ERR_ENOENT) { errno = ENXIO; } + if (err == PICO_ERR_EINTR) { errno = ENXIO; } + if (err == PICO_ERR_EIO) { errno = ENXIO; } + if (err == PICO_ERR_ENXIO) { errno = ENXIO; } // + if (err == PICO_ERR_EAGAIN) { errno = ENXIO; } + if (err == PICO_ERR_ENOMEM) { errno = ENOMEM; } // + if (err == PICO_ERR_EACCESS) { errno = ENXIO; } + if (err == PICO_ERR_EFAULT) { errno = ENXIO; } + if (err == PICO_ERR_EBUSY) { errno = ENXIO; } + if (err == PICO_ERR_EEXIST) { errno = ENXIO; } + if (err == PICO_ERR_EINVAL) { errno = EINVAL; } // + if (err == PICO_ERR_ENONET) { errno = ENXIO; } + if (err == PICO_ERR_EPROTO) { errno = ENXIO; } + if (err == PICO_ERR_ENOPROTOOPT) { errno = ENXIO; } + if (err == PICO_ERR_EPROTONOSUPPORT) { errno = ENXIO; } + if (err == PICO_ERR_EOPNOTSUPP) { errno = ENXIO; } + if (err == PICO_ERR_EADDRINUSE) { errno = ENXIO; } + if (err == PICO_ERR_EADDRNOTAVAIL) { errno = ENXIO; } + if (err == PICO_ERR_ENETDOWN) { errno = ENXIO; } + if (err == PICO_ERR_ENETUNREACH) { errno = ENXIO; } + if (err == PICO_ERR_ECONNRESET) { errno = ENXIO; } + if (err == PICO_ERR_EISCONN) { errno = ENXIO; } + if (err == PICO_ERR_ENOTCONN) { errno = ENXIO; } + if (err == PICO_ERR_ESHUTDOWN) { errno = ENXIO; } + if (err == PICO_ERR_ETIMEDOUT) { errno = ENXIO; } + if (err == PICO_ERR_ECONNREFUSED) { errno = ENXIO; } + if (err == PICO_ERR_EHOSTDOWN) { errno = ENXIO; } + if (err == PICO_ERR_EHOSTUNREACH) { errno = ENXIO; } + return -1; +} + +char *beautify_pico_error(int err) +{ + if (err== 0) return (char*)"PICO_ERR_NOERR"; + if (err== 1) return (char*)"PICO_ERR_EPERM"; + if (err== 2) return (char*)"PICO_ERR_ENOENT"; + // ... + if (err== 4) return (char*)"PICO_ERR_EINTR"; + if (err== 5) return (char*)"PICO_ERR_EIO"; + if (err== 6) return (char*)"PICO_ERR_ENXIO (no such device or address)"; + // ... + if (err== 11) return (char*)"PICO_ERR_EAGAIN"; + if (err== 12) return (char*)"PICO_ERR_ENOMEM (not enough space)"; + if (err== 13) return (char*)"PICO_ERR_EACCESS"; + if (err== 14) return (char*)"PICO_ERR_EFAULT"; + // ... + if (err== 16) return (char*)"PICO_ERR_EBUSY"; + if (err== 17) return (char*)"PICO_ERR_EEXIST"; + // ... + if (err== 22) return (char*)"PICO_ERR_EINVAL (invalid argument)"; + // ... + if (err== 64) return (char*)"PICO_ERR_ENONET"; + // ... + if (err== 71) return (char*)"PICO_ERR_EPROTO"; + // ... + if (err== 92) return (char*)"PICO_ERR_ENOPROTOOPT"; + if (err== 93) return (char*)"PICO_ERR_EPROTONOSUPPORT"; + // ... + if (err== 95) return (char*)"PICO_ERR_EOPNOTSUPP"; + if (err== 98) return (char*)"PICO_ERR_EADDRINUSE"; + if (err== 99) return (char*)"PICO_ERR_EADDRNOTAVAIL"; + if (err==100) return (char*)"PICO_ERR_ENETDOWN"; + if (err==101) return (char*)"PICO_ERR_ENETUNREACH"; + // ... + if (err==104) return (char*)"PICO_ERR_ECONNRESET"; + // ... + if (err==106) return (char*)"PICO_ERR_EISCONN"; + if (err==107) return (char*)"PICO_ERR_ENOTCONN"; + if (err==108) return (char*)"PICO_ERR_ESHUTDOWN"; + // ... + if (err==110) return (char*)"PICO_ERR_ETIMEDOUT"; + if (err==111) return (char*)"PICO_ERR_ECONNREFUSED"; + if (err==112) return (char*)"PICO_ERR_EHOSTDOWN"; + if (err==113) return (char*)"PICO_ERR_EHOSTUNREACH"; + return (char*)"UNKNOWN_ERROR"; +} + +/* + +#define PICO_SOCKET_STATE_UNDEFINED 0x0000u +#define PICO_SOCKET_STATE_SHUT_LOCAL 0x0001u +#define PICO_SOCKET_STATE_SHUT_REMOTE 0x0002u +#define PICO_SOCKET_STATE_BOUND 0x0004u +#define PICO_SOCKET_STATE_CONNECTED 0x0008u +#define PICO_SOCKET_STATE_CLOSING 0x0010u +#define PICO_SOCKET_STATE_CLOSED 0x0020u + +# define PICO_SOCKET_STATE_TCP 0xFF00u +# define PICO_SOCKET_STATE_TCP_UNDEF 0x00FFu +# define PICO_SOCKET_STATE_TCP_CLOSED 0x0100u +# define PICO_SOCKET_STATE_TCP_LISTEN 0x0200u +# define PICO_SOCKET_STATE_TCP_SYN_SENT 0x0300u +# define PICO_SOCKET_STATE_TCP_SYN_RECV 0x0400u +# define PICO_SOCKET_STATE_TCP_ESTABLISHED 0x0500u +# define PICO_SOCKET_STATE_TCP_CLOSE_WAIT 0x0600u +# define PICO_SOCKET_STATE_TCP_LAST_ACK 0x0700u +# define PICO_SOCKET_STATE_TCP_FIN_WAIT1 0x0800u +# define PICO_SOCKET_STATE_TCP_FIN_WAIT2 0x0900u +# define PICO_SOCKET_STATE_TCP_CLOSING 0x0a00u +# define PICO_SOCKET_STATE_TCP_TIME_WAIT 0x0b00u +# define PICO_SOCKET_STATE_TCP_ARRAYSIZ 0x0cu + +*/ +char *beautify_pico_state(int state) +{ + static char state_str[512]; + char *str_ptr = state_str; + + if (state & PICO_SOCKET_STATE_UNDEFINED) { + sprintf(str_ptr, "UNDEFINED "); + str_ptr += strlen("UNDEFINED "); + } + if (state & PICO_SOCKET_STATE_SHUT_LOCAL) { + sprintf(str_ptr, "SHUT_LOCAL "); + str_ptr += strlen("SHUT_LOCAL "); + } + if (state & PICO_SOCKET_STATE_SHUT_REMOTE) { + sprintf(str_ptr, "SHUT_REMOTE "); + str_ptr += strlen("SHUT_REMOTE "); + } + if (state & PICO_SOCKET_STATE_BOUND) { + sprintf(str_ptr, "BOUND "); + str_ptr += strlen("BOUND "); + } + if (state & PICO_SOCKET_STATE_CONNECTED) { + sprintf(str_ptr, "CONNECTED "); + str_ptr += strlen("CONNECTED "); + } + if (state & PICO_SOCKET_STATE_CLOSING) { + sprintf(str_ptr, "CLOSING "); + str_ptr += strlen("CLOSING "); + } + if (state & PICO_SOCKET_STATE_CLOSED) { + sprintf(str_ptr, "CLOSED "); + str_ptr += strlen("CLOSED "); + } + + + if (state & PICO_SOCKET_STATE_TCP) { + sprintf(str_ptr, "TCP "); + str_ptr += strlen("TCP "); + } + if (state & PICO_SOCKET_STATE_TCP_UNDEF) { + sprintf(str_ptr, "TCP_UNDEF "); + str_ptr += strlen("TCP_UNDEF "); + } + if (state & PICO_SOCKET_STATE_TCP_CLOSED) { + sprintf(str_ptr, "TCP_CLOSED "); + str_ptr += strlen("TCP_CLOSED "); + } + if (state & PICO_SOCKET_STATE_TCP_LISTEN) { + sprintf(str_ptr, "TCP_LISTEN "); + str_ptr += strlen("TCP_LISTEN "); + } + if (state & PICO_SOCKET_STATE_TCP_SYN_SENT) { + sprintf(str_ptr, "TCP_SYN_SENT "); + str_ptr += strlen("TCP_SYN_SENT "); + } + if (state & PICO_SOCKET_STATE_TCP_SYN_RECV) { + sprintf(str_ptr, "TCP_SYN_RECV "); + str_ptr += strlen("TCP_SYN_RECV "); + } + if (state & PICO_SOCKET_STATE_TCP_ESTABLISHED) { + sprintf(str_ptr, "TCP_ESTABLISHED "); + str_ptr += strlen("TCP_ESTABLISHED "); + } + if (state & PICO_SOCKET_STATE_TCP_CLOSE_WAIT) { + sprintf(str_ptr, "TCP_CLOSE_WAIT "); + str_ptr += strlen("TCP_CLOSE_WAIT "); + } + if (state & PICO_SOCKET_STATE_TCP_LAST_ACK) { + sprintf(str_ptr, "TCP_LAST_ACK "); + str_ptr += strlen("TCP_LAST_ACK "); + } + if (state & PICO_SOCKET_STATE_TCP_FIN_WAIT1) { + sprintf(str_ptr, "TCP_FIN_WAIT1 "); + str_ptr += strlen("TCP_FIN_WAIT1 "); + } + if (state & PICO_SOCKET_STATE_TCP_FIN_WAIT2) { + sprintf(str_ptr, "TCP_FIN_WAIT2 "); + str_ptr += strlen("TCP_FIN_WAIT2 "); + } + if (state & PICO_SOCKET_STATE_TCP_CLOSING) { + sprintf(str_ptr, "TCP_CLOSING "); + str_ptr += strlen("TCP_CLOSING "); + } + if (state & PICO_SOCKET_STATE_TCP_TIME_WAIT) { + sprintf(str_ptr, "TCP_TIME_WAIT "); + str_ptr += strlen("TCP_TIME_WAIT "); + } + if (state & PICO_SOCKET_STATE_TCP_ARRAYSIZ) { + sprintf(str_ptr, "TCP_ARRAYSIZ "); + str_ptr += strlen("TCP_ARRAYSIZ "); + } + return (char*)state_str; +} + +#endif // STACK_PICO |
